Category Archives: Ethical Hacking

Employee Access Review – Preventing Access Creep

Access creep is a common problem and one way that employees sometimes end up with a greater level of access than what they should have.  One of the items we examine during a security assessment is employee access. While reviewing … Continue reading

Posted in Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Firesheep Hijacking Tool Makes Hacking For Dummies a Reality

Over the years, there has been a steady progression of polished, easy to use tools that have lowered the bar for hackers. Firesheep is a good example of one such tool. Firesheep was designed to highlight how many web sites … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , | Leave a comment

MagicJack Hacking

MagicJack is a great device for those traveling abroad or anyone needing an occasional extra phone.  The only real problem is when you happen to forget the MagicJack adapter or in situations when it’s just not possible to plug in … Continue reading

Posted in Ethical Hacking, Smart Phone Hacking | Tagged , , , | Leave a comment

Web Cam Hacking

While web cameras make it easy to keep in touch with friends and family it is possible for these devices to be hacked. If you have a web cam on your laptop or home computer, hackers may target these devices.  … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Wireless Vulnerabilities are a Tempting Target for Cyber Criminals and Hackers

Wireless continues to be a big security concern as it is a primary attack vector for hackers.  It is also something that needs to be closely examined during a security assessment.   Even if your not part of a ethical hacking … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Assessing Malware Found During a Network Security Assessment

If there is anything to be learned from the continued security breaches and cyber attacks that we’ve witnessed this year is that companies must have a good incident response plan in place and be prepared to deal with advanced threats … Continue reading

Posted in Ethical Hacking | Tagged , , , , , | Leave a comment

Are You Getting a Charge Out of Hacking?

You may be getting a charge out of hacking if you are using the Energizer DUO USB Battery Charger.  This battery charger comes with software to allow Windows users to monitor the status of the batteries while they are charging.  … Continue reading

Posted in Ethical Hacking | Tagged | Leave a comment